13060348681 | Reliability | measure of percentage of time a machine, service and network is usable by the respective user base | 0 | |
13060348682 | Integrity | the degree in which a data stored in a computer storage can be trusted no to be lost or damaged | 1 | |
13060348683 | Security | the degree in which data stored or in transit through a computer network can be trusted not to be Destroyed, Altered or Disclosed to unauthorized parties | 2 | |
13060348684 | Performance | within some set of constraints, system should run as efficiently as possible and as fast as possible | 3 | |
13060348685 | Efficiency | a system should be managed in a way that it increases the productivity of the administration staff | 4 | |
13060348686 | Ease of Use | the degree in which a user should be able to perform their task in the way they desire | 5 | |
13060348687 | Order | the degree in which the layout,operation or management of a computer system conform to a set of regulatory policy and guidelines | 6 | |
13060348688 | Role of the system administrator is to maximize a system's ? | RISPEEO ( Reliability, Integrity, Security, Performance, Efficiency, Ease of Use, Order ) | 7 | |
13060348689 | measure of reliability | Uptime | 8 | |
13060348690 | Integrity is largely affected by | Storage Design, Administration procedure, Protocol and hardware design | 9 | |
13060348691 | Performance can be improved through | Capital Expenditure, Procedures and Policy, Users | 10 | |
13060348692 | Factors that affect performance | Underlying Architecture, Operating Systems, Software design and bugs in software, Tuning of Operating System, Administration and End User Practices | 11 | |
13060348693 | Administrator are expected to do | Install Hardware, Install and manage software, set and manage configuration, manage a local documentation, create procedures and policy, Enforcement and Arbitration (Executing Policy e.g. Performing Backups), Advise and Train user and management. | 12 | |
13060348694 | Field of Password File | Username,Encrypted Password Placeholder,UID,GID,GECOS Information/Field,Home Directory,Login Shell | 13 | |
13060348695 | Fields of Shadow File | Username,Encrypted Password,Time since last change, Min time between Change, Max time between Change, Warn this many day before expiry (uname:passwd:last:may:must:warn:expire:disable:rsvd) | 14 | |
13060348696 | Formula for Availability | Mean Time between Failure/(Mean Time To Repair + Mean Time between Failure) | 15 | |
13060348697 | !! or :!!: means | The account is inactive | 16 | |
13060348698 | how to change password policy in linux | edit the /etc/login.defs file | 17 | |
13060348699 | Fields of /etc/group | name:password:GID:members | 18 | |
13060348700 | How to use useradd command | sudo useradd -c "name" -d "/usr/home" -g "primaryGroup" -G "secondaryGroup" -m -s"/bin/bash" username | 19 | |
13060348701 | How to disable logins | usermod -L username | 20 | |
13060348702 | How to use userdel command | userdel -r username | 21 | |
13060348703 | Commands to manage accounts | useradd, userdel, usermod, groupadd, groupdel, groupmod | 22 | |
13060348704 | 3 Advantages of using sudo | Increase in Accountability, Operator can work without unlimited root privileges, root password known only to several people | 23 | |
13060348705 | What is Absolute Pathing | the entire path through the filesystem to get to the actual object | 24 | |
13060348706 | What is Relative Pathing | the path to an actual object relative to your current working directory | 25 | |
13060348707 | List some common filesystem types in UNIX | BFS DOSFS NFS HFS NUCFS S5 SFS UFS VxFS | 26 | |
13060348708 | A filesystem can be ? | disk partition, a disk-based logical volume, network file server | 27 | |
13060348709 | What is sudo ? | sudo is a package that allows you to delegate root powers to conventional users. | 28 | |
13060348710 | What function does a daemon perform? | daemon is a background process that handles requests for services such as print, spooling, and file transfers and is dormant when not required. | 29 | |
13060348711 | what is a kernel | kernel is a core component that is loaded when you first turn on your computer | 30 | |
13060348712 | What is the top level of the filesystem called ? | root ("/") | 31 | |
13060348713 | How to use mount command | mount /dev/sda /users | 32 | |
13060348714 | Describe filesystem structure | A Filesystem has : The superblock which contains information about the filesystem in general. the inodes table which contains several inodes, each describing a file or directory and has a unique inode number for identification and contains the file size, data block location, last date modified, permissions and ownership the data which makes up content the file as well as the filename are stored in the data block which are referenced by the inodes. | 33 | |
13060348715 | What is a hard linked file | a hard linked file is a direct copy of one another as they share the same inode and inode number. | 34 | |
13060348716 | What is the command to change ownership of a file and how to use it | chown chown username filename | 35 | |
13060348717 | what is the command to change the group ownership of a file and how to use it | chgrp chgrp grpname filename | 36 | |
13060348718 | what is the umask? | umask are used to take away permissions on new files and directories immediately after they are created. | 37 | |
13060348719 | what is a RAID | raid is a redundant array of inexpensive/independent disks which is a combined storage devices into one virtualized device | 38 | |
13060348720 | What is the purpose of RAID | 1. increase redundancy 2.increase Reliability | 39 | |
13060348721 | What is a Parity Data | used by RAID to achieve redundancy. a certain checksum is calculated which then is written to a disk. | 40 | |
13060348722 | What is a N+1 Redundancy | N+1 Redundancy is where a selected component in a system have a second item to take over should the first one fail | 41 | |
13060348723 | What is Full Redundancy | Full Redundancy is where two sets of the identical hardware are provided. | 42 | |
13060348724 | What is ZFS | ZFS is a comprehensive approach to storage management which includes the function of logical volume management and RAID | 43 | |
13060348725 | What are the features of ZFS | 1.Dynamic stripping and redundancy 2.Pooled storage 3.Scrubbing 4.Data Compression 5.Copy on write transactions 6.Snapshots & Clones 7.Ability to reconstruct dead devices from healthy devices | 44 | |
13060348726 | List of Common UNIX Shells | 1. Borne Shell (sh) 2.POSIX Shell (sh) 3.Korn shell (ksh) 4.C Shell (csh) 5.BASH Shell (bash) | 45 | |
13072001184 | List of Special permission | Set user id (SUID) Set group id (SGID) Sticky bit | 46 | |
13072014143 | Read Bit | allows user to list the files within the directory | 47 | |
13072017870 | Write Bit | allows user to create, delete and modify files within the directory and modify the directory's attribute | 48 | |
13072030462 | Execute Bit | allows user to enter a directory and executes files within them and the directory inside | 49 | |
13072050694 | Sticky Bit | states that the files and directories within this directory can only be deleted or renamed by their owner (root). | 50 | |
13072060825 | Set User ID (SUID) | if set on an executable file, the person executing that file temporarily becomes the owner of that file | 51 | |
13072067042 | Set Group ID (SGID) | if set on an executable file, the person executing that file temporarily becomes the member of the group that file is attached to | 52 | |
13072078383 | Set Sticky Bit | if set on a directory in addition to write permission, users can add files to the directory but can only delete the ones they created not others | 53 | |
13072102251 | Command to create stripped pool | sudo zpool create poolname devices pathname | 54 | |
13072107500 | Command to create mirrored pool | sudo zpool create mirror poolname devices pathname | 55 | |
13072119414 | Command to check the status of pools | sudo zpool status / sudo zpool list poolname | 56 | |
13072121962 | Command to destroy pool | sudo zpool destroy poolname | 57 | |
13072126961 | Command to create RAIDZ pool | sudo zpool create poolname RAIDZ devices pathname (must contain at least 3 devices) | 58 | |
13072136296 | Command to create zfs filesystem | sudo zfs create pathname | 59 | |
13072140558 | Command to list zfs | sudo zfs list | 60 | |
13072144975 | Command to set quota to zfs | sudo zfs set quota=size zfsPath | 61 | |
13072155696 | Command to change mount point in filesystem (ZFS) | sudo zfs mountpoint=/pathname currentpathname | 62 | |
13072170876 | Command to create zfs snapshot | sudo zfs snapshot zfspathname@snapshotname | 63 | |
13072177719 | Command to list zfs snapshot | sudo zfs list -l snapshot | 64 | |
13072181630 | Command to rollback to a certain snapshot | sudo zfs rollback zfspathname@snapshotname | 65 | |
13072187534 | Command to create zfs clone | sudo zfs clone zfspathname@snapshotname zfspathname/clonename | 66 | |
13072873077 | Physical layer | provides the physical connection between computer and network wiring | 67 | |
13072877249 | Data Link Layer | provides packing and unpacking bits of data for transmission | 68 | |
13072882346 | Network Layer | provides routing of data through computer network | 69 | |
13072886419 | Transport Layer | Concerned with the error correction and synchronization | 70 | |
13072892768 | Session Layer | concerned with the connection establishment between two points | 71 | |
13072896610 | Presentation Layer | involves translating data i.e. ASCII or UNICODE | 72 | |
13072901932 | Application Layer | provides functionality to user, security and access to resources | 73 | |
13072907838 | Elements of an IP Packet | 1. Source Address 2. Destination Address 3. Time to Live 4. Options 5. Checksum | 74 | |
13072938521 | Classes of IP addresses | Class A= 1-126 Class B= 128-191 Class C=192-223 Class D=224-239 Class E=240-254 Ranges 127.x.x.x are reserved for loopback and localhost | 75 | |
13076251596 | when is network translation used | it is used when a packets are sent from a host in the internal network its source address are rewritten by the gateway if the destination is outside current network | 76 | |
13076257028 | What is ICMP? | Internet Control Message Protocol used for error or control message between hosts , not applications Examples: -Destination Unreachable -Source Quench | 77 | |
13076263033 | Explain TCP and UDP | TCP (Transmission control protocol) -Provides a reliable full duplex virtual circuit. -takes care of packets out of order, re transmit and variable data rates -used where reliable full-duplex data stream is required UDP (User datagram protocl) -A connectionless communication -each packet is stand alone -no error checking -used for situations where virtual circuit is not required | 78 | |
13076272681 | Explain Three Way Handshake | both parties send their initial sequence number via SYN Packets then both parties response to each others sequence number by sending ACK Packets | 79 | |
13076277308 | DHCP (Dynamic Host Configuration Protocol) | DHCP is a plug and play service that operates when your device first access a network | 80 | |
13076280514 | DHCP overview | -host broadcast a "DHCP discover" message -DHCP server response with a "DHCP offer" message -host request of an ip address by sending "DHCP request" message -DHCP Server sends ip address by sending "DHCP ack" message | 81 | |
13076288750 | Explain Recursive and Non-Recursive Server | Non-Recursive Server -> returns a referral to another authoritative server that are likely to know the answer Recursive Server -> returns the real answers, and error message. it follows on the referral itself, relieving the client of this duty. | 82 | |
13076293744 | DNS Records | -SOA -NS -A Record -PTR Record -MX -CNAME | 83 | |
13076296069 | Explain SOA | Start of authority, indicates the begining of a zone contains: - name of the zone - administration for the zone - timeout information | 84 | |
13076299155 | Explain NS | Identifies which server are authoritative for a zone | 85 | |
13076301182 | Explain A Records | Provides the name to address mappings in the DNS Database | 86 | |
13076302444 | Explain PTR Records | Provides the address to name mappings in the DNS Database | 87 | |
13076303882 | Explain MX | Mail Exchange record, created to help routing of email | 88 | |
13076305630 | Explain CName | describes the canonical names for the hosts in the DNS namespace | 89 | |
13076308399 | How security is compromised ? | -Social Engineering -Software Vulnerabilities -Configuration Errors | 90 |
CSCI322 Flashcards
Primary tabs
Need Help?
We hope your visit has been a productive one. If you're having any problems, or would like to give some feedback, we'd love to hear from you.
For general help, questions, and suggestions, try our dedicated support forums.
If you need to contact the Course-Notes.Org web experience team, please use our contact form.
Need Notes?
While we strive to provide the most comprehensive notes for as many high school textbooks as possible, there are certainly going to be some that we miss. Drop us a note and let us know which textbooks you need. Be sure to include which edition of the textbook you are using! If we see enough demand, we'll do whatever we can to get those notes up on the site for you!